First published: Wed Apr 10 2024(Updated: )
A flaw was found in Keycloak. Certain endpoints in Keycloak's admin REST API allow low-privilege users to access administrative functionalities. This flaw allows users to perform actions reserved for administrators, potentially leading to data breaches or system compromise.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.keycloak:keycloak-services | <24.0.5 | 24.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3656 is classified as a high-severity vulnerability due to its potential to allow low-privilege users access to administrative functionalities in Keycloak.
To fix CVE-2024-3656, upgrade Keycloak to version 24.0.5 or later.
The risks associated with CVE-2024-3656 include data breaches and potential system compromise due to unauthorized access to administrative APIs.
CVE-2024-3656 affects Keycloak versions prior to 24.0.5, specifically those utilizing the admin REST API.
Low-privilege users can perform actions reserved for administrators, which may lead to unauthorized configuration changes or data access.